Tagged Questions

The Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael.

My server generates an AES encrypted file which when downloaded acts as an input for an application. So, should I hardcode the symmetric key inside the application or should I randomly generate the ...

I have made a Veracrypt Containment that uses AES to encrypt everything inside. But my question is: can I securely put the containment file in public (everybody can access it) without anybody able to ...

The openssl enc -aes-256-gcm command is broken, because it can't decrypt its own output, otherwise I would look to that as a format.
In order to decrypt a file, code needs to be able to separate the ...

I would like to do the following on FIPS 140-3 Level 3 certified cryptographic token using PKCS#11:
Generate RSA key pair on token
Import AES key from multiple components
Wrap and export RSA private ...

I'm in a situation where I know that I have to decrypt a file encrypted using AES 256 CBC and I've the following details:
I know the first 16 bytes block in plain text
I know the IV (static 128 bit ...

I am using Tresorit on Mac OS X and iPhone.
When I am using it there is always applied client-side encryption before posting the file to cloud. The key used for encryption is AES-256 and CFB mode of ...

My goal was to create a private key and to encrypt it with a strong cipher. That key would be used as a root certificate for an internal Certification Authority.
However, eventhough openssl supports ...

Is there any instance of NIST or other encryption standards using AES-CCM to encrypt/authenticate key data? I would like to use CCM over a keywrap function, but cannot find any precedent for this in ...

A 256 bit AES key is required to be broken using the brute force method on a 2GHz computer.
How long would it take to break the key in the best case and in the worst case situations? Assume that 1000 ...

I'm working on an embedded project that needs to communicate with a server. Both the server and the device have an AES key pre-installed.
I have a network device that provides http services but not ...

For quite a while I've been experimentally hacking wireless routers by capturing handshakes and Decrypting them using oclHashcat on my computer. even the most complicated passwords won't take longer ...

It is fairly well known that on Windows, when you delete a file (or folder which may contain any number of files and subfolders possibly containing other files and subfolders and so on), Windows just ...

For AES based encryption on TCP/IP connections, I am guessing I have to do the following:
Have the 2 parties share a common key, assuming I am doing AES-128 then a sequence of 16 bytes. Ideally the ...

I'm trying to figure out how a given executable works. I know it's using AES-128 to encrypt and decrypt, but the specifics of the code are unknown. I can get the executable to encrypt and decrypt any ...

Given that two clients want to sync data through a server, is it safe to use AES to encrypt the data and TLS to communicate with the server?
Assumptions:
Server has never access to unencrypted data ...

An active attacker changes the ciphertext which was made using the AES cipher algorithm.
Which message properties are preserved even though that change was made. Choose one of the below:
1) Integrity ...

I understand PCI DSS 3.0 allows hashes of cardnumbers to be stored separately from encrypted values, but I'm startled at the efficiency of tools like hashcat in discovering card numbers from hashed ...

I was wondering if an adversary have your private gpg key but not the password/phrase, how easy/difficult would it be to crack a encrypted file compared to a encryption that only use password and not ...

I'm not very familiar with encryption and new to this, I'm just learning it right now by code review of one of the class we have in an application to encrypt a password using AES. Would anyone explain ...

I'm hoping to use the below issue we came across recently to better understand Java's security providers, ciphers and encryption in general.
We got the following error during an SSL Handshake (using ...

I am writing a paper on reducing the power consumption of security protocols. I am having trouble identifying sources that describe real-time usage of DES and AES, and how often they are used. I plan ...

I got a little problem regarding AES decryption. I have to decrypt some text that has been encrypted using 128bit AES / ECB with PHP mcrypt. The thing is, the key that is being used to encrypt/decrypt ...

I got a Microsoft Sculpt keyboard, as it seems to be a small improvement over the much loved Ergo 4000. (What I'd give to have an Ergo 4000 with CheryMX Blues...)
On various sites, they have this one ...